2Boyed D, Ellison N. Social network sites:Definition, history, and scholarship [J]. Journal of Computer- Mediated Communication, 2008, 13(1): 201-230.
3Nagy J, Pecho P. Social network security [C]// Proceedings of the 3rd IEEE International Conference on Emerging Security Information, Systems and Technologies. Athens, Greece.. IEEE Computer Society, 2009: 321-325.
4Douglis F. It's all about the (social) network[J]. IEEE Internet Computing, 2010, 14(1): 4-6.
5Limsaiprom P, Tantatsanawong P. Social network anomaly and attack patterns analysis[C]//Proceedings of the 6th IEEE International Conference on Networked Computing. Heidelberg, Germany: IEEE Press, 2010: 11-13.
6Hogben G. Security issues in the future of social networking[R/OL]. W3C Workshop on the Future of Social Networking, 2009 [2011-04-20]. http://www. w3. org/2008/09/msnws/papers/Future_of_ SN_ Giles_Hogben_ENISA. pdf.
7Poppe R. Scalable face labeling in online social networks [C]// IEEE International Conference on Automatic Face & Gesture Recognition and Workshops. California, USA: IEEE Press, 2011: 566-571.
8Jagatic T, Johnson N, Jakobsson M, et al. Social phishing[J]. Communications of the ACM, 2007, 50(3) : 94-100.
9Douceur J R. The sybil attack[J]. Lecture Notes in Computer Science, 2002, 2 429: 251-260.
10Ge M, Lam K, Wang X Q, et al. VisualSec.. A secure message delivery scheme for online social networks based on profile images [C]// Proceedings of GLOBECOM'09 : Global Telecommunications Conference. HI, USA: IEEE Press, 2009: 1-6.